Vulnerabilities Exploited in the Wild with Public PoC
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
2,391 results
Clear all
CVE-2023-29336
7.8
HIGH
KEV
3 PoCs
Analysis
EPSS 0.79
Win32k - Privilege Escalation
Win32k Elevation of Privilege Vulnerability
CWE-416
May 09, 2023
CVE-2023-27372
9.8
CRITICAL
EXPLOITED
16 PoCs
Analysis
NUCLEI
EPSS 0.93
Spip < 3.2.18 - Insecure Deserialization
SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.
CWE-502
Feb 28, 2023
CVE-2023-1389
8.8
HIGH
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Tp-link Archer Ax21 Firmware < 1.1.4 - Command Injection
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
CWE-77
Mar 15, 2023
CVE-2023-21839
7.5
HIGH
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CWE-502
Jan 18, 2023
CVE-2023-31290
5.9
MEDIUM
EXPLOITED
1 PoC
Analysis
EPSS 0.01
Trust Wallet Core <3.1.1 - Info Disclosure
Trust Wallet Core before 3.1.1, as used in the Trust Wallet browser extension before 0.0.183, allows theft of funds because the entropy is 32 bits, as exploited in the wild in December 2022 and March 2023. This occurs because the mt19937 Mersenne Twister takes a single 32-bit value as an input seed, resulting in only four billion possible mnemonics. The affected versions of the browser extension are 0.0.172 through 0.0.182. To steal funds efficiently, an attacker can identify all Ethereum addresses created since the 0.0.172 release, and check whether they are Ethereum addresses that could have been created by this extension. To respond to the risk, affected users need to upgrade the product version and also move funds to a new wallet address.
CWE-338
Apr 27, 2023
CVE-2023-24055
5.5
MEDIUM
EXPLOITED
7 PoCs
Analysis
EPSS 0.41
KeePass <2.53 - Info Disclosure
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
CWE-312
Jan 22, 2023
CVE-2023-27350
9.8
CRITICAL
KEV
RANSOMWARE
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Papercut MF < 20.1.7 - Improper Access Control
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
CWE-284
Apr 20, 2023
CVE-2023-28432
7.5
HIGH
KEV
20 PoCs
Analysis
NUCLEI
EPSS 0.94
Minio <RELEASE.2023-03-20T20-16-18Z - Info Disclosure
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY`
and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
CWE-200
Mar 22, 2023
CVE-2023-2033
8.8
HIGH
KEV
6 PoCs
Analysis
EPSS 0.25
Google Chrome < 112.0.5615.121 - Type Confusion
Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CWE-843
Apr 14, 2023
CVE-2023-20963
7.8
HIGH
KEV
4 PoCs
Analysis
EPSS 0.02
Google Android - Improper Certificate Validation
In WorkSource, there is a possible parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-220302519
CWE-295
Mar 24, 2023
CVE-2023-28252
7.8
HIGH
KEV
RANSOMWARE
8 PoCs
Analysis
EPSS 0.69
Microsoft Windows 10 1507 < 10.0.10240.19869 - Out-of-Bounds Write
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-122
Apr 11, 2023
CVE-2023-28206
8.6
HIGH
KEV
2 PoCs
Analysis
EPSS 0.24
Apple Ipados < 15.7.5 - Out-of-Bounds Write
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
CWE-787
Apr 10, 2023
CVE-2023-28205
8.8
HIGH
KEV
2 PoCs
Analysis
EPSS 0.00
Apple Safari < 16.4.1 - Use After Free
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CWE-416
Apr 10, 2023
CVE-2023-0266
7.9
HIGH
KEV
1 PoC
Analysis
EPSS 0.00
ALSA PCM - Use After Free
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e
CWE-416
Jan 30, 2023
CVE-2023-25136
6.5
MEDIUM
11 PoCs
Analysis
EPSS 0.88
Openbsd Openssh - Double Free
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
CWE-415
Feb 03, 2023
CVE-2023-26360
8.6
HIGH
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Adobe ColdFusion <2018 Update 15, 2021 Update 5 - RCE
Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.
CWE-284
Mar 23, 2023
CVE-2023-23397
9.8
CRITICAL
KEV
RANSOMWARE
32 PoCs
Analysis
EPSS 0.94
Microsoft Outlook - Privilege Escalation
Microsoft Outlook Elevation of Privilege Vulnerability
CWE-20
Mar 14, 2023
CVE-2023-21768
7.8
HIGH
EXPLOITED
16 PoCs
Analysis
EPSS 0.76
Windows Ancillary Function Driver - Privilege Escalation
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CWE-822
Jan 10, 2023
CVE-2023-21823
7.8
HIGH
KEV
1 PoC
Analysis
EPSS 0.05
Windows Graphics Component - RCE
Windows Graphics Component Remote Code Execution Vulnerability
CWE-190
Feb 14, 2023
CVE-2023-0669
7.2
HIGH
KEV
RANSOMWARE
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Fortra GoAnywhere MFT Unsafe Deserialization RCE
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
CWE-502
Feb 06, 2023